This site is 100% ad supported. Please add an exception to adblock for this site.

Info tech final exam

Terms

undefined, object
copy deck
music, art, literary works, software and movies
what do copyrights protect?
.zip
compressed file
trademark
sign of a business or organization
with user interaction
how do viruses spread?
word choice and sentence structure
what does tone refer to in terms of emails?
infectious malware
viruses and worms
patents
rights that protect inventions
Really Simple Syndication
what does RSS stand for?
encryption
how do we secure wireless networks?
radio waves
what do we use to communicate on wireless networks?
searching, fitting constraints, recognizing patterns, logical inferences
what are the four methods of solving problems that make up AI
blind carbon copy
what does Bcc stand for?
inadvertent and intentional
what are the two types of plagiarism?
input and output devices
interact with and get feedback from
searching
finding answers based on reasoning and planning
pop-ups, security holes, untrustworthy files, software with malware bundled in it
what are ways we get malware?
binary digit
what does bit stand for?
logical inferences
finding answer by using reasoning, inductionm, and deduction
storage device
stores information
an IT security device that will permit or deny traffic to protect our information
what is a firewall and why do we have it?
targeted advertising
information is analyzed to present specific advertisements
without user interaction
how do worms spread?
ascii
used to translate words or letters into binary code
filename
file1.doc
floppy drive-A; Hard drive-C; Network drive-H; USB drive-D
what are the types of drives and their letters?
reverse engineering
studying things by taking them apart, and learning how they work
network
two or more computers connected together via a telecom system in order to share resources and information
file extension
helps identify what the file is and what program opens it
password
form of authentic data used to control access to a resource
email flaming
abusive messages
war games and video games
what is an example of logical inferences?
fitting constraints
finding answers based on what fits into the confined space
hypertext markup language
what does HTML stand for?
computer
programmable machine that stores, retrieves, and processes data
podcasts
media files that destributed by subscription using syndication
online profiling
websites that obtain as much information from the user as possible
add, change, remove, edit
what can be don to a wiki?
fair use
allows educators to use copyrighted work
back-up our files
why do we have drives and other media?
hertz
speed
license
permission given by the owner to use the work
spam and phishing
what are two things to be concerned with in email security?
.mp3, .wav, .wma
some audio file types?
telephone number; unique
describe an IP
social media
what are blogs and wikis types of?
police face prints
what is an example of fitting constraints?
concealment
trojan horses
internet
all smaller networks working together in the world
search engine
what is an example of searchng?
.avi, .wmv, .mpg
some video file types?
what you see is what you get
what does WYSIWYG stand for?
malware and malicious people
what do firewalls protect against?
protect our computers by keeping out malware and block sites that go against our code of conduct
why do we have filters?
share resources, information and communicate
why do we have computer networks in the world?
operating system
manages files systems, controls imput and output devices, and facilitates networking
drive
a device attached to a computer used to store various media
webpage
resource of information suitable for the world wide web accessed through a web browser
copyrights
rights that regulate an idea or expression
controls where people go when they leave our network
what do filters do?
public domain
work that isn't owned by anyone
copy, distribute, display, modify, perform
what are the five rights of copyrights?
wired and wireless
what are the two types of networks?
aggregator
software that is used to collect all syndicated feeds into one place
both
is a firewall software or hardware?
location
hard drive - C drive
malware for profit
spyware
wiki
website that allows visitor to add, change, remove, or edit
privacy policy
websites will indicate what information is taken and what they do with it
cryptography
study of message security
Bcc
hide recipients name and provide security for email addresses
motherboard
connects all parts together
spam
electronic junk mail
blog
user generated website with reverse chronological entries
intellectual property
product of the mind that are protected under law
recognizing patterns
finding answers by picking what matches the criteria
phishing
con game used to gain personal information
Information Technology
what does IT stand for?
malware
software designed to infiltrate or damage a computer system without a user's information consent
cookies
files that are placed on the computer to track your online habits
bytes
storage
delete/destroy files, slow computer down, steal information, crash computers
why are viruses and worms harmful?
.jpg, .bmp, .gif, .png
some picture files?
digital rights management
what does DRM stand for?
collaborative software
wikis use what type of software?
artificial intelligence
capacity of a computer to learn and make decisions in order to solve problems
data
what do telecomm systems send?
Cc
information purposes
cyberbullying
deliberate recurring harm through electronic messages
access points
how do we connect to SUA's network?
path
C:\temp
dynamic and static
what are the two types of content that webpages usually have on them?
internet protocol
what does IP stand for?
WEO and WPA
what are the two main types of wireless security?
8
how many bits are in a byte
addressing, audience, subject lines, open and close property, grammar, proofread, and watch sarcasm
what are the guidelines for good etiquette?
web feed
format used to provide updated content
file path
C:\temp\file1.doc
http; padlock icon
how can you tell if a website is secure?
Carbon Copy
what does Cc stand for?
neural networks
what is an example of recognizing patterns?
plagiarism
taking the ideas of others and offering them as your own
our information is vulnerable
why do we have security on the internet?
CPU
brain of computer or does calculation
domain name system
what does DNS stand for?
antivirus software
how do we get rid of viruses and worms?
encryption
process of obscuring information to make it unreadable without special knowledge
domain name
how we refer to websites
no
are wireless networks secured by default?

Deck Info

108

permalink